How to cheat Samsung smartphone protection S8

The iris eye scanner, integrated into the Samsung Galaxy S8 smartphone, can be fooled by the use of photos. Although the scanner and understands the difference between the screen of the images and voluminous objects, as the German experts have discovered, simply paste the contact photo of the lens, to bring down this tool with the sense.

The experts have demonstrated the solution of one of the main biometric instruments of authorization of the logo of Samsung S8. The iris scanner of the eyes can be fooled by the use of photos.

Galaxy S8 - the second line of South Korean smartphones equipped with the retina scanner. The first was the Galaxy Note range of 7. These manufacturer devices had to be withdrawn due to the numerous cases of overheating and fire of the batteries. Therefore, the Galaxy S8 became the first smartphone, users who were able to evaluate the iris scanner, as well as other biometric authorization means. In particular, the fingerprint scanner and the face scanner.

Like a fingerprint, the iris is unique to every person. Ways to trick scanners of known fingerprints. But there is quite simple and in it, even in an elegant way to fool another and a retina scanner.

Samsung engineers have predicted the likelihood that the iris scanner will try to fool you through photographs, therefore, equipped with its depth detector. However, the researchers happened to simulate the volume with the help of contact lenses, glued to the eyes in the photo. And this trick has worked.

Therefore, if the attacker has physical access to a Samsung smartphone that has blocked by auto iris of the eyes, to unlock the will need to the extent of a large photograph of the face of the owner of the device, printed on a printer Color (and best of all are just Samsung printers), a pair of contact lenses and glue.

It is the iris scanner of the eyes of Samsung was to use as the main method of authorization in the payment system of Samsung Pay. That is, in the case of the impact of a smartphone in the hands of an attacker, under the threat of not only the data stored in it, but also the owner's finances.